CVE-2025-7760
Ofisimo · Web Package Flora
Ofisimo Web Package Flora is vulnerable to Cross-Site Scripting (XSS) via improper neutralization of input within HTTP headers. This allows attackers to inject malicious scripts into web pages.
Executive summary
An unauthenticated attacker can execute malicious scripts in the context of a user's browser session via a Cross-Site Scripting (XSS) vulnerability in the Ofisimo Web Package Flora software.
Vulnerability
This is an Improper Neutralization of Input During Web Page Generation (XSS) vulnerability. It specifically allows for the injection of malicious payloads through HTTP headers, which are then improperly rendered by the application, likely affecting unauthenticated users interacting with the web interface.
Business impact
A successful XSS attack can lead to the theft of session cookies, account takeover, and the defacement of the web application. With a CVSS score of 7.6, this High severity flaw poses a direct threat to user data integrity and can be used as a stepping stone for more complex attacks against the organization's web infrastructure.
Remediation
Immediate Action: Apply the security updates provided by Ofisimo for the Web Package Flora platform to implement proper input validation and output encoding.
Proactive Monitoring: Monitor web server logs for suspicious HTTP headers containing script tags (e.g., <script>) or unusual encoded characters.
Compensating Controls: Implement a robust Content Security Policy (CSP) to restrict the sources from which scripts can be executed and use a WAF to filter malicious HTTP header input.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The severity of this XSS vulnerability requires immediate remediation to protect end-users. Organizations using Ofisimo Flora should verify their patch levels and ensure that all web-facing components are correctly configured to sanitize all forms of input, including headers.